USENIX Security '25

Wednesday, August 13

7:00 am–8:45 am

Continental Breakfast

Room 605–610

8:45 am–9:30 am

Opening Remarks and Awards

Ballroom 6ABC

9:30 am–10:00 am

Coffee and Tea Break

Room 605–610

10:00 am–11:30 am

Track 1

Social Issues and Usable Security and Privacy

Session Chair: Veronica Rivera, Stanford University

Ballroom 6C

Analyzing the AI Nudification Application Ecosystem

Cassidy Gibson and Daniel Olszewski, University of Florida; Natalie Grace Brigham, University of Washington; Anna Crowder, Kevin R. B. Butler, and Patrick Traynor, University of Florida; Elissa M. Redmiles, Georgetown University; Tadayoshi Kohno, University of Washington

Long Presentation
Available Media

Characterizing and Detecting Propaganda-Spreading Accounts on Telegram

Klim Kireev, EPFL, MPI-SP Max Plank Institute for Security and Privacy; Yevhen Mykhno, unaffiliated; Carmela Troncoso, EPFL, MPI-SP Max Plank Institute for Security and Privacy; Rebekah Overdorf, Ruhr University Bochum (RUB), Research Center Trustworthy Data Science and Security in University Alliance Ruhr, University of Lausanne

Distinguished Paper Award Winner

Long Presentation
Available Media
Track 2
Track 3

LLM Security and Attacks

Session Chair: Omer Akgul, Carnegie Mellon University/RSAC Labs

Ballroom 6A

GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors

Wenlong Meng, Shuguo Fan, and Chengkun Wei, Zhejiang University; Min Chen, Vrije Universiteit Amsterdam; Yuwei Li, National University of Defense Technology and Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation; Yuanchao Zhang, Mybank, Ant Group; Zhikun Zhang and Wenzhi Chen, Zhejiang University

Long Presentation
Available Media

Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms

Pengli Wang, MOEKey Lab of HCST (PKU), School of Computer Science, Peking University; Bingyou Dong, ByteDance; Yifeng Cai, MOEKey Lab of HCST (PKU), School of Computer Science, Peking University; Zheng Zhang, ByteDance; Junlin Liu, MOEKey Lab of HCST (PKU), School of Computer Science, Peking University; Huanran Xue, Ye Wu, and Yao Zhang, ByteDance; Ziqi Zhang, University of Illinois Urbana-Champaign

Short Presentation
Available Media
Track 4

Software Security 1

Session Chair: Sébastien Bardin, CEA List, Université Paris Saclay

Room 611–614

Tady: A Neural Disassembler without Structural Constraint Violations

Siliang Qin, Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences; Fengrui Yang and Hao Wang, Tsinghua University; Bolun Zhang, Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences; Zeyu Gao and Chao Zhang, Tsinghua University; Kai Chen, Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences

Short Presentation
Available Media
Track 5

System Security 1: Threat Detection, Exploitation, and Adaptive Defenses

Session Chair: Syed Rafiul Hussain, The Pennsylvania State University

Room 606–609

CoVault: Secure, Scalable Analytics of Personal Data

Roberta De Viti and Isaac Sheff, Max Planck Institute for Software Systems (MPI-SWS), Saarland Informatics Campus; Noemi Glaeser, Max Planck Institute for Security and Privacy (MPI-SP) and University of Maryland; Baltasar Dinis, Instituto Superior Técnico (ULisboa), INESC-ID; Rodrigo Rodrigues, Instituto Superior Técnico (ULisboa) / INESC-ID; Bobby Bhattacharjee, University of Maryland; Anwar Hithnawi, ETH Zürich; Deepak Garg and Peter Druschel, Max Planck Institute for Software Systems (MPI-SWS), Saarland Informatics Campus

Short Presentation
Available Media

TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis

Bo Zhang, Nanjing University of Science and Technology; Yansong Gao, The University of Western Australia; Changlong Yu and Boyu Kuang, Nanjing University of Science and Technology; Zhi Zhang, The University of Western Australia; Hyoungshick Kim, Sungkyunkwan University; Anmin Fu, Nanjing University of Science and Technology

Long Presentation
Available Media

From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems

Jiaxu Zhao, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences; Beijing Key Laboratory of Network Security and Protection Technology; Yuekang Li, University of New South Wales; Yanyan Zou, Yang Xiao, Naijia Jiang, Yeting Li, Nanyu Zhong, Bingwei Peng, Kunpeng Jian, and Wei Huo, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences; Beijing Key Laboratory of Network Security and Protection Technology

Long Presentation
Available Media

11:30 am–1:00 pm

Lunch (on your own)

1:00 pm–2:30 pm

Track 1

Network Security 1: Censorship, Evasion, and Trustworthy Infrastructure

Session Chair: Kirill Nikitin, Columbia University and New York Genome Center

Ballroom 6C

Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability

Chuhan Wang, Southeast University and Tsinghua University; Chenkai Wang, University of Illinois Urbana-Champaign; Songyi Yang, Tsinghua University; Sophia Liu, University of Illinois Urbana-Champaign; Jianjun Chen, Tsinghua University and Zhongguancun Laboratory; Haixin Duan, Tsinghua University and Quan Cheng Laboratory; Gang Wang, University of Illinois Urbana-Champaign

Short Presentation
Available Media

Ares: Comprehensive Path Hijacking Detection via Routing Tree

Yinxiang Tao, Institute of Network Sciences and Cyberspace, Tsinghua University, Beijing, China; Chengwan Zhang, unaffiliated; Changqing An, Institute of Network Sciences and Cyberspace, Tsinghua University, Beijing, China; Shuying Zhuang, Zhongguancun Laboratory, Beijing, China; Jilong Wang, Quan Cheng Laboratory, 250103, Jinan, Shandong, China and Institute of Network Sciences and Cyberspace, Tsinghua University, Beijing, China; Congcong Miao, Tencent

Short Presentation
Available Media
Track 3

ML and AI Security 1: Images

Session Chair: Avital Shafran, The Hebrew University of Jerusalem

Ballroom 6A

USD: NSFW Content Detection for Text-to-Image Models via Scene Graph

Yuyang Zhang, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University; Kangjie Chen, Nanyang Technological University; Xudong Jiang, Jiahui Wen, Yihui Jin, and Ziyou Liang, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University; Yihao Huang, National University of Singapore; Run Wang and Lina Wang, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University

Long Presentation
Available Media
Track 4

System Security 2: Trusted and Robust Computing

Session Chair: Hyungon Moon, UNIST (Ulsan National Institute of Science and Technology)

Room 611–614

TETD: Trusted Execution in Trust Domains

Zhanbo Wang, Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, China, and Pengcheng Laboratory, China; Jiaxin Zhan, Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, China, and Department of Computer Science and Engineering, Southern University of Science and Technology, China; Xuhua Ding, Singapore Management University; Fengwei Zhang, Department of Computer Science and Engineering, Southern University of Science and Technology, China, and Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, China; Ning Hu, Pengcheng Laboratory, China

Short Presentation
Available Media
Track 5

Blockchain Security, Attacks, and Defenses

Session Chair: Zhibo Sun, Drexel University

Room 606–609

Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain

Zheyuan He, University of Electronic Science and Technology of China; Zihao Li, The Hong Kong Polytechnic University; Jiahao Luo, University of Electronic Science and Technology of China; Feng Luo, The Hong Kong Polytechnic University; Junhan Duan, Carnegie Mellon University; Jingwei Li and Shuwei Song, University of Electronic Science and Technology of China; Xiapu Luo, The Hong Kong Polytechnic University; Ting Chen and Xiaosong Zhang, University of Electronic Science and Technology of China

Long Presentation
Available Media

Let's Move2EVM

Lorenzo Benetollo, Ca' Foscari University of Venice, University of Camerino, and Christian Doppler Laboratory Blockchain Technologies for the Internet of Things; Andreas Lackner, TU Wien; Matteo Maffei and Markus Scherer, TU Wien and Christian Doppler Laboratory Blockchain Technologies for the Internet of Things

Short Presentation
Available Media

2:30 pm–3:00 pm

Coffee and Tea Break

Room 605–610

3:00 pm–4:30 pm

Track 1

Usable Privacy and Security 1

Session Chair: Frank Li, Georgia Institute of Technology

Ballroom 6C

Digital Security Perceptions and Practices Around the World: A WEIRD versus Non-WEIRD Comparison

Franziska Herbert, Ruhr University Bochum; Collins W. Munyendo, The George Washington University and Max Planck Institute for Security and Privacy; Jonas Hielscher, Ruhr University Bochum; Steffen Becker, Ruhr University Bochum and Max Planck Institute for Security and Privacy; Yixin Zou, Max Planck Institute for Security and Privacy

Short Presentation
Available Media

SoK: Come Together – Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework

Ali Teymourian and Andrew M. Webb, Division of Computer Science & Engineering, Louisiana State University; Taha Gharaibeh, Division of Computer Science & Engineering, Baggil(i) Truth (BiT) Lab, Center for Computation and Technology, Louisiana State University; Arushi Ghildiyal, Division of Computer Science & Engineering, Louisiana State University; Ibrahim Baggili, Division of Computer Science & Engineering, Baggil(i) Truth (BiT) Lab, Center for Computation and Technology, Louisiana State University

Long Presentation
Available Media

AirTag-Facilitated Stalking Protection: Evaluating Unwanted Tracking Notifications and Tracker Locating Features

Dañiel Gerhardt, CISPA Helmholtz Center for Information Security and Saarland University; Matthias Fassl, CISPA Helmholtz Center for Information Security; Carolyn Guthoff, CISPA Helmholtz Center for Information Security and Saarland University; Adrian Dabrowski, Research Center IT-Security, University of Applied Sciences FH Campus Wien; Katharina Krombholz, CISPA Helmholtz Center for Information Security

Short Presentation
Available Media
Track 2
Track 3

LLM Privacy

Session Chair: Shagufta Mehnaz, The Pennsylvania State University

Ballroom 6A

Membership Inference Attacks Against Vision-Language Models

Yuke Hu, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Zheng Li, Shandong University; Zhihao Liu, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Yang Zhang, CISPA Helmholtz Center for Information Security; Zhan Qin, Kui Ren, and Chun Chen, The State Key Laboratory of Blockchain and Data Security, Zhejiang University

Short Presentation
Available Media

Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models

Yu He, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Boheng Li, College of Computing and Data Science, Nanyang Technological University; Liu Liu and Zhongjie Ba, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Wei Dong, College of Computing and Data Science, Nanyang Technological University; Yiming Li, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; and College of Computing and Data Science, Nanyang Technological University; Zhan Qin, Kui Ren, and Chun Chen, The State Key Laboratory of Blockchain and Data Security, Zhejiang University

Short Presentation
Available Media
Track 4

Embedded and Hardware Security

Session Chair: Ning Zhang, Washington University in St. Louis

Room 611–614

GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays

Tobias Scharnowski, Simeon Hoffmann, Moritz Bley, and Simon Wörner, CISPA Helmholtz Center for Information Security; Daniel Klischies, Ruhr-Universität Bochum; Felix Buchmann, Nils Ole Tippenhauer, and Thorsten Holz, CISPA Helmholtz Center for Information Security; Marius Muench, University of Birmingham

Long Presentation
Available Media
Track 5

Crypto 1: Zero Knowledge and Multi-Party Computation

Session Chair: Nirvan Tyagi, University of Washington

Room 606–609

MAESTRO: Multi-Party AES Using Lookup Tables

Hiraku Morita, Aarhus University and University of Copenhagen; Erik Pohle, COSIC, KU Leuven; Kunihiko Sadakane, The University of Tokyo; Peter Scholl, Aarhus University; Kazunari Tozawa, The University of Tokyo; Daniel Tschudi, Concordium and Eastern Switzerland University of Applied Sciences (OST)

Short Presentation
Available Media

Efficient 2PC for Constant Round Secure Equality Testing and Comparison

Tianpei Lu, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Xin Kang, Xidian University; Bingsheng Zhang, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security; Zhuo Ma, Xidian University; Xiaoyuan Zhang, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Yang Liu, Xidian University; Kui Ren and Chun Chen, The State Key Laboratory of Blockchain and Data Security, Zhejiang University

Short Presentation
Available Media

Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions

Minglang Dong, School of Cyber Science and Technology, Shandong University; Quan Cheng Laboratory; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University; Cong Zhang, Institute for Advanced Study, BNRist, Tsinghua University; Yujie Bai and Yu Chen, School of Cyber Science and Technology, Shandong University; Quan Cheng Laboratory; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University

Long Presentation
Available Media

DFS: Delegation-friendly zkSNARK and Private Delegation of Provers

Yuncong Hu, Shanghai Jiao Tong University; Pratyush Mishra, University of Pennsylvania; Xiao Wang, Northwestern University; Jie Xie, Shanghai Jiao Tong University; Kang Yang, State Key Laboratory of Cryptology; Yu Yu, Shanghai Jiao Tong University and Shanghai Qi Zhi Institute; Yuwen Zhang, University of California, Berkeley

Short Presentation
Available Media

5:00 pm–6:00 pm

Poster Session and Happy Hour

Ballroom 6E

Check out the cool new ideas and the latest preliminary work on display at the Poster Session and Happy Hour. Take advantage of the opportunity to mingle with colleagues who may share your area of interest while enjoying complimentary food and drinks. View the list of accepted posters.

6:00 pm–7:00 pm

Thursday, August 14

8:00 am–9:00 am

Continental Breakfast

Room 605–610

9:00 am–10:30 am

Track 1

Usable Privacy and Security 2: Software and Experts

Session Chair: Guillermo Suarez-Tangil, IMDEA Networks

Ballroom 6C
Track 3

LLM Security 2: Jailbreaking and Prompt Stealing

Session Chair: Xinyue Shen, CISPA Helmholtz Center for Information Security

Ballroom 6A

Prompt Obfuscation for Large Language Models

David Pape and Sina Mavali, CISPA Helmholtz Center for Information Security; Thorsten Eisenhofer, Berlin Institute for the Foundations of Learning and Data (BIFOLD) and Technische Universität Berlin; Lea Schönherr, CISPA Helmholtz Center for Information Security

Short Presentation
Available Media
Track 4

Hardware Security 1: Microarchitectures

Session Chair: Sukarno Mertoguno, Georgia Institute of Technology

Room 611–614
Track 5

Privacy 1: Differential Privacy and Audit

Session Chair: Aaron Johnson, U.S. Naval Research Laboratory

Room 606–609

Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling

Shaowei Wang and Changyu Dong, Guangzhou University; Xiangfu Song, National University of Singapore; Jin Li, Guangzhou University and Guangdong Key Laboratory of Blockchain Security (Guangzhou University); Zhili Zhou, Guangzhou University; Di Wang, King Abdullah University of Science and Technology (KAUST); Han Wu, University of Southampton

Long Presentation
Available Media

10:30 am–11:00 am

Coffee and Tea Break

Room 605–610

11:00 am–12:30 pm

Track 1

Software Security and Usable Security

Session Chair: Omer Akgul, Carnegie Mellon University/RSAC Labs

Ballroom 6C

Confusing Value with Enumeration: Studying the Use of CVEs in Academia

Moritz Schloegel, CISPA Helmholtz Center for Information Security; Daniel Klischies, Ruhr University Bochum; Simon Koch and David Klein, TU Braunschweig; Lukas Gerlach, CISPA Helmholtz Center for Information Security; Malte Wessels, TU Braunschweig; Leon Trampert, CISPA Helmholtz Center for Information Security; Martin Johns, TU Braunschweig; Mathy Vanhoef, DistriNet, KU Leuven; Michael Schwarz and Thorsten Holz, CISPA Helmholtz Center for Information Security; Jo Van Bulck, DistriNet, KU Leuven

Distinguished Paper Award Winner

Long Presentation
Available Media
Track 2
Track 3

ML and AI Privacy 1: Federated Learning and Protecting Data

Session Chair: Shagufta Mehnaz, The Pennsylvania State University

Ballroom 6A

SoK: On Gradient Leakage in Federated Learning

Jiacheng Du and Jiahui Hu, The State Key Laboratory of Blockchain and Data Security, Zhejiang University, P. R. China; Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, P. R. China; and College of Computer Science and Electronic Engineering, Hunan University, P. R. China; Zhibo Wang, The State Key Laboratory of Blockchain and Data Security, Zhejiang University, P. R. China; Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, P. R. China; Peng Sun, College of Computer Science and Electronic Engineering, Hunan University, P. R. China; Neil Gong, Department of Electrical and Computer Engineering, Duke University, USA; Kui Ren and Chun Chen, The State Key Laboratory of Blockchain and Data Security, Zhejiang University, P. R. China; Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, P. R. China

Short Presentation
Available Media
Track 4

Web and Mobile Security

Session Chair: Omid Mirzaei, Cisco Talos

Room 611–614

Hercules Droidot and the murder on the JNI Express

Luca Di Bartolomeo and Philipp Mao, EPFL; Yu-Jye Tung and Jessy Ayala, University of California, Irvine; Samuele Doria, University of Padua; Paolo Celada and Marcel Busch, EPFL; Joshua Garcia, University of California, Irvine; Eleonora Losiouk, University of Padova; Mathias Payer, EPFL

Short Presentation
Available Media
Track 5

Crypto 2: Private Information Retrieval and Computation

Session Chair: Andre Gregio, Federal University of Parana (UFPR), Brazil

Room 606–609

Practical Keyword Private Information Retrieval from Key-to-Index Mappings

Meng Hao, School of Computing & Information Systems, Singapore Management University; Weiran Liu and Liqiang Peng, Alibaba Group; Cong Zhang, Institute for Advanced Study, BNRist, Tsinghua University; Pengfei Wu, School of Computing & Information Systems, Singapore Management University; Lei Zhang, Alibaba Group; Hongwei Li, Peng Cheng Laboratory; Robert H. Deng, School of Computing & Information Systems, Singapore Management University

Short Presentation
Available Media

Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios

Binbin Tu and Yujie Bai, School of Cyber Science and Technology, Shandong University; Quan Cheng Laboratory; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University; Cong Zhang, Institute for Advanced Study, BNRist, Tsinghua University; Yang Cao and Yu Chen, School of Cyber Science and Technology, Shandong University; Quan Cheng Laboratory; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University

Short Presentation
Available Media

12:30 pm–2:00 pm

2:00 pm–3:30 pm

Track 1

Network Security 2: Routing and DoS

Session Chair: Paul Pearce, Georgia Institute of Technology

Ballroom 6C

Lemon: Network-Wide DDoS Detection with Routing-Oblivious Per-Flow Measurement

Wenhao Wu, Zhenyu Li, and Xilai Liu, Institute of Computing Technology, Chinese Academy of Sciences; University of Chinese Academy of Sciences; Zhaohua Wang and Heng Pan, Computer Network Information Center, Chinese Academy of Sciences; Guangxing Zhang, Institute of Computing Technology, Chinese Academy of Sciences; Gaogang Xie, Computer Network Information Center, Chinese Academy of Sciences; University of Chinese Academy of Sciences

Short Presentation
Available Media
Track 2
Track 3

LLM Security 3

Session Chair: Thorsten Eisenhofer, Technische Universität Berlin

Ballroom 6A
Track 4

Hardware Security 2

Session Chair: Alessandro Erba, Karlsruhe Institute of Technology

Room 611–614

The Ghost Navigator: Revisiting the Hidden Vulnerability of Localization in Autonomous Driving

Junqi Zhang, University of Science and Technology of China; Shaoyin Cheng, University of Science and Technology of China and Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation; Linqing Hu, University of Science and Technology of China; Jie Zhang, CFAR and IHPC, A*STAR; Chengyu Shi, DeepBlue College; Xingshuo Han and Tianwei Zhang, Nanyang Technological University; Yueqiang Cheng, MediaTek; Weiming Zhang, University of Science and Technology of China and Anhui Province Key Laboratory of Digital Security

Short Presentation
Available Media
Track 5

Blockchain Security 2: Infrastructure, Protocol Design, and Governance

Session Chair: Mu Zhang, University of Utah

Room 606–609

On the Atomicity and Efficiency of Blockchain Payment Channels

Di Wu, Shoupeng Ren, and Yuman Bai, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Lipeng He, University of Waterloo; Jian Liu, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Wu Wen, International Business School, Zhejiang University; Kui Ren and Chun Chen, The State Key Laboratory of Blockchain and Data Security, Zhejiang University

Short Presentation
Available Media

Automated Soundness and Completeness Vetting of Polygon zkEVM

Xinghao Peng, The Hong Kong Polytechnic University; Zhiyuan Sun, The Hong Kong Polytechnic University and Southern University of Science and Technology; Kunsong Zhao, Zuchao Ma, Zihao Li, Jinan Jiang, and Xiapu Luo, The Hong Kong Polytechnic University; Yinqian Zhang, Southern University of Science and Technology

Short Presentation
Available Media

3:30 pm–4:00 pm

Coffee and Tea Break

Room 605–610

4:00 pm–5:30 pm

Track 1

System Security 3: Mobile Platforms

Session Chair: Mathias Payer, EPFL

Ballroom 6C
Track 2

Software Security 2: Patching and Repair

Session Chair: Imtiaz Karim, The University of Texas at Dallas

Ballroom 6B

SoK: Towards Effective Automated Vulnerability Repair

Ying Li, University of California, Los Angeles; Faysal Hossain Shezan, University of Texas at Arlington; Bomin Wei, University of California, Los Angeles; Gang Wang, University of Illinois Urbana-Champaign; Yuan Tian, University of California, Los Angeles

Short Presentation
Available Media

VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization

Yeting Li and Yecheng Sun, Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences; Zhiwu Xu, College of Computer Science and Software Engineering, Shenzhen University; Haiming Chen, Institute of Software, Chinese Academy of Sciences; Xinyi Wang, Hengyu Yang, and Huina Chao, Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences; Cen Zhang, School of Computer Science and Engineering, Nanyang Technological University; Yang Xiao, Yanyan Zou, Feng Li, and Wei Huo, Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences

Long Presentation
Available Media
Track 3

ML and AI Security 2

Session Chair: Blaine Hoak, University of Wisconsin—Madison

Ballroom 6A

SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis

Zhisheng Zhang, Beijing University of Posts and Telecommunications; Derui Wang, CSIRO's Data61; Qianyi Yang, Pengyang Huang, and Junhan Pu, Beijing University of Posts and Telecommunications; Yuxin Cao, National University of Singapore; Kai Ye, The University of Hong Kong; Jie Hao and Yixian Yang, Beijing University of Posts and Telecommunications

Short Presentation
Available Media

SoK: Automated TTP Extraction from CTI Reports – Are We There Yet?

Marvin Büchel, Carl von Ossietzky Universität Oldenburg; Tommaso Paladini, Politecnico di Milano, NEC Laboratories Europe GmbH; Stefano Longari, Michele Carminati, and Stefano Zanero, Politecnico di Milano; Hodaya Binyamini, Gal Engelberg, and Dan Klein, Accenture Labs; Giancarlo Guizzardi, University of Twente; Marco Caselli, Siemens AG; Andrea Continella and Maarten van Steen, University of Twente; Andreas Peter, Carl von Ossietzky Universität Oldenburg; Thijs van Ede, University of Twente

Short Presentation
Available Media

Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems

Weifei Jin, Beijing University of Posts and Telecommunications; Yuxin Cao, National University of Singapore; Junjie Su, Beijing University of Posts and Telecommunications; Derui Wang, CSIRO's Data61; Yedi Zhang, National University of Singapore; Minhui Xue, CSIRO's Data61; Jie Hao, Beijing University of Posts and Telecommunications; Jin Song Dong, National University of Singapore; Yixian Yang, Beijing University of Posts and Telecommunications

Long Presentation
Available Media

When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems

Haolin Wu, Wuhan University and Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, China; Chang Liu, University of Science and Technology of China; Jing Chen, Ruiying Du, Kun He, and Yu Zhang, Wuhan University and Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, China; Cong Wu and Tianwei Zhang, Nanyang Technological University; Qing Guo and Jie Zhang, CFAR and IHPC, A*STAR, Singapore

Long Presentation
Available Media
Track 4

Fraud, Malware, Spam

Session Chair: Omid Mirzaei, Cisco Talos

Room 611–614

NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines

Mingxuan Liu, Zhongguancun Laboratory; Yunyi Zhang, Tsinghua University and National University of Defense Technology; Lijie Wu, Tsinghua University; Baojun Liu, Tsinghua University and Zhongguancun Laboratory; Geng Hong, Fudan University; Yiming Zhang, Tsinghua University; Hui Jiang, Tsinghua University and Baidu Inc; Jia Zhang and Haixin Duan, Tsinghua University and Quancheng Laboratory; Min Zhang, National University of Defense Technology; Wei Guan, Baidu Inc; Fan Shi, National University of Defense Technology; Min Yang, Fudan University

Short Presentation
Available Media

Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection

Yinyuan Zhang, School of Computer Science, Peking University; Key Laboratory of High Confidence Software Technologys (Peking University), Ministry of Education; Cuiying Gao, Huazhong University of Science and Technology; JD.com; Yueming Wu, Nanyang Technological University; Shihan Dou, Fudan University; Cong Wu, Nanyang Technological University; Ying Zhang, Key Laboratory of High Confidence Software Technologys (Peking University), Ministry of Education; National Engineering Research Center of Software Engineering, Peking University; Wei Yuan, Huazhong University of Science and Technology; Yang Liu, Nanyang Technological University

Short Presentation
Available Media
Track 5

Crypto 3: Formal Methods and Private Computation

Session Chair: Aaron Johnson, U.S. Naval Research Laboratory

Room 606–609

Improved Secure Two-party Computation from a Geometric Perspective

Hao Guo, School of Science and Engineering, The Chinese University of Hong Kong, Shenzhen; Liqiang Peng, Alibaba Group; Haiyang Xue, Singapore Management University; Li Peng and Weiran Liu, Alibaba Group; Zhe Liu, Zhejiang Lab; Lei Hu, Institute of Information Engineering, Chinese Academy of Sciences

Short Presentation
Available Media

5:30 pm–7:00 pm

7:00 pm–8:00 pm

Friday, August 15

8:00 am–9:00 am

Continental Breakfast

Room 605–610

9:00 am–10:30 am

Track 1

Social Issues and Security

Session Chair: Filipo Sharevski, Depaul University

Ballroom 6C

Dormant: Defending against Pose-driven Human Image Animation

Jiachen Zhou and Mingsi Wang, Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China; Tianlin Li, Nanyang Technological University, Singapore; Guozhu Meng and Kai Chen, Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China

Short Presentation
Available Media
Track 2

Network Security 3: BLE and Cellular

Session Chair: Imtiaz Karim, Purdue University

Ballroom 6B

AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication

Yang Yang and Guomin Yang, Singapore Management University; Yingjiu Li, University of Oregon; Minming Huang, Singapore Management University; Zilin Shen and Imtiaz Karim, Purdue University; Ralf Sasse and David Basin, ETH Zurich; Elisa Bertino, Purdue University; Jian Weng, Jinan University; Hwee Hwa PANG and Robert H. Deng, Singapore Management University

Short Presentation
Available Media

A Thorough Security Analysis of BLE Proximity Tracking Protocols

Xiaofeng Liu, School of Cyber Science and Technology, Shandong University; Chaoshun Zuo, Ohio State University; Qinsheng Hou, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University; Pengcheng Ren, China Mobile Information Technology Co., Ltd.; Jianliang Wu, Simon Fraser University; Qingchuan Zhao, City University of Hong Kong; Shanqing Guo, School of Cyber Science and Technology, Shandong University & Shandong Key Laboratory of Artificial Intelligence Security

Long Presentation
Available Media
Track 3

ML and AI Privacy 2

Session Chair: Simon Oya, The University of British Columbia

Ballroom 6A
Track 4

Hardware Security 3: Side-Channel and Fault Injection Attacks

Session Chair: Stefan Mangard, Graz University of Technology

Room 611–614

Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis

Azade Rezaeezade, Delft University of Technology and Digital Security Group, Radboud University; Trevor Yap, Dirmanto Jap, and Shivam Bhasin, Temasek Laboratories and National integrated Centre For Evaluation, Nanyang Technological University; Stjepan Picek, Digital Security Group, Radboud University and University of Zagreb Faculty of Electrical Engineering and Computing

Long Presentation
Available Media
Track 5

Privacy 2: Consent, Compliance, and Provable Privacy

Session Chair: Shuang Hao, The University of Texas at Dallas

Room 606–609

Privacy Law Enforcement Under Centralized Governance: A Qualitative Analysis of Four Years' Special Privacy Rectification Campaigns

Tao Jing, School of Cyber Science and Engineering, Huazhong University of Science and Technology, JinYinHu Laboratory, Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security; Yao Li and Jingzhou Ye, University of Central Florida; Jie Wang, School of Cyber Science and Engineering, Huazhong University of Science and Technology, JinYinHu Laboratory, Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security; Xueqiang Wang, University of Central Florida

Short Presentation
Available Media

Who Pays Whom? Anonymous EMV-Compliant Contactless Payments

Charles Olivier-Anclin, Universite de Clermont Auvergne, LIMOS; INSA CVL, LIFO, Université d'Orléans, Inria; and be ys Pay; Ioana Boureanu, Liqun Chen, and C. J. P. Newton, Surrey Centre for Cyber Security, University of Surrey; Tom Chothia, Anna Clee, and Andreas Kokkinis, University of Birmingham; Pascal Lafourcade, Universite de Clermont Auvergne, LIMOS

Short Presentation
Available Media

10:30 am–11:00 am

Coffee and Tea Break

Room 605–610

11:00 am–12:30 pm

Track 1

Usable Privacy and Security 3

Session Chair: Karola Marky, Ruhr University Bochum

Ballroom 6C

How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency Practices

Jan H. Klemmer, Juliane Schmüser, Fabian Fischer, Jacques Suray, Jan-Ulrich Holtgrave, and Simon Lenau, CISPA Helmholtz Center for Information Security; Byron M. Lowens, Indiana University Indianapolis; Florian Schaub, University of Michigan; Sascha Fahl, CISPA Helmholtz Center for Information Security

Distinguished Paper Award Winner

Long Presentation
Available Media
Track 2

Software Security 3: Fuzzing

Session Chair: Andre Gregio, Federal University of Parana (UFPR), Brazil

Ballroom 6B

Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation

Lingming Zhang, Zhejiang University; Binbin Zhao, Zhejiang University, Georgia Institute of Technology, and Engineering Research Center of Blockchain Application, Supervision And Management (Southeast University), Ministry of Education; Jiacheng Xu and Peiyu Liu, Zhejiang University; Qinge Xie, Georgia Institute of Technology; Yuan Tian, UCLA; Jianhai Chen and Shouling Ji, Zhejiang University

Short Presentation
Available Media

MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers

Xiangpu Song, Shandong University; Jianliang Wu, Simon Fraser University; Yingpei Zeng, Hangzhou Dianzi University; Hao Pan, Shandong University; Chaoshun Zuo, Ohio State University; Qingchuan Zhao, City University of Hong Kong; Shanqing Guo, Shandong University and Shandong Key Laboratory of Artificial Intelligence Security

Short Presentation
Available Media

IDFuzz: Intelligent Directed Grey-box Fuzzing

Yiyang Chen, Tsinghua University; Chao Zhang, Tsinghua University and JCSS, Tsinghua University (INSC) - Science City (Guangzhou) Digital Technology Group Co., Ltd.; Long Wang, Tsinghua University; Wenyu Zhu, Tsinghua University and AscendGrace Tech; Changhua Luo, Wuhan University; Nuoqi Gui, Zheyu Ma, and Xingjian Zhang, Tsinghua University; Bingkai Su, Hunan University

Long Presentation
Available Media
Track 3

ML and AI Security 3: Backdoors, Poisoning, Unlearning

Session Chair: Omid Mirzaei, Cisco Talos

Ballroom 6A

PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning

Xiaoyi Pang, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security; Chenxu Zhao, The State Key Laboratory of Blockchain and Data Security and School of Cyber Science and Technology, Zhejiang University; Zhibo Wang, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security; Jiahui Hu, The State Key Laboratory of Blockchain and Data Security and School of Cyber Science and Technology, Zhejiang University; Yinggui Wang, Lei Wang, and Tao Wei, Ant Group; Kui Ren and Chun Chen, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security

Short Presentation
Available Media
Track 4

Privacy 3: Attacks

Session Chair: Xiaokuan Zhang, George Mason University

Room 611–614

Addressing the Address Books' (Interdependent) Privacy Issues

Kavous Salehzadeh Niksirat, University of Lausanne / Max Planck Institute for Security and Privacy; Lev Velykoivanenko, University of Lausanne; Samuel Mätzler, University of Zurich; Stephan Mulders, Maastricht University; Aurelia Tamò-Larrieux, Marc-Olivier Boldi, Mathias Humbert, and Kévin Huguenin, University of Lausanne

Long Presentation
Available Media

DiffLoc: WiFi Hidden Camera Localization Based on Electromagnetic Diffraction

Xiang Zhang, University of Science and Technology of China; Jie Zhang, CFAR and IHPC, A*STAR; Huan Yan, Guizhou Normal University; Jinyang Huang, Hefei University of Technology; Zehua Ma and Bin Liu, University of Science and Technology of China; Meng Li, Hefei University of Technology; Kejiang Chen, University of Science and Technology of China; Qing Guo, CFAR and IHPC, A*STAR; Tianwei Zhang, Nanyang Technological University; Zhi Liu, The University of Electro-Communications

Short Presentation
Available Media
Track 5

Crypto 4: Systems and Protocols

Session Chair: Nirvan Tyagi, University of Washington

Room 606–609

S/MINE: Collecting and Analyzing S/MIME Certificates at Scale

Gurur Öndarö and Jonas Kaspereit, Münster University of Applied Sciences; Samson Umezulike, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE; Christoph Saatjohann, Münster University of Applied Sciences; Fabian Ising, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE; Sebastian Schinzel, Münster University of Applied Sciences, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE

Short Presentation
Available Media

12:30 pm–2:00 pm

Lunch (on your own)

2:00 pm–3:30 pm

Track 1

Software Security 4: Fuzzing and Other Software Analysis

Session Chair: Xinda Wang, The University of Texas at Dallas

Ballroom 6C
Track 2

Network Security 4: Internet and Beyond

Session Chair: Adam Bates, University of Illinois at Urbana–Champaign

Ballroom 6B

ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems

Baoxiang Jiang, Xi'an Jiaotong University; Tristan Bilot, Université Paris-Saclay, LISITE– Isep, and Iriguard; Nour El Madhoun, LISITE – Isep; Khaldoun Al Agha, Université Paris-Saclay; Anis Zouaoui, Iriguard; Shahrear Iqbal, National Research Council Canada; Xueyuan Han, Wake Forest University; Thomas Pasquier, University of British Columbia

Short Presentation
Available Media
Track 3

ML and AI Security 4: Robustness

Session Chair: Lichao Wu, Technische Universität Darmstadt

Ballroom 6A

CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization

Derui Wang, Kristen Moore, Diksha Goel, and Minjune Kim, CSIRO's Data61 and Cyber Security Cooperative Research Centre; Gang Li, Yang Li, and Robin Doss, Deakin University; Minhui Xue, CSIRO's Data61 and Cyber Security Cooperative Research Centre; Bo Li, University of Chicago; Seyit Camtepe, CSIRO's Data61 and Cyber Security Cooperative Research Centre; Liming Zhu, CSIRO's Data61

Long Presentation
Available Media
Track 4

System Security 4: Kernel and Low-Level System Security

Session Chair: Zhiyun Qian, University of California, Riverside

Room 611–614
Track 5

Privacy 4: Privacy-Preserving Computation

Session Chair: Sarah Scheffler, Carnegie Mellon University

Room 606–609

3:30 pm–4:00 pm

Coffee and Tea Break

Room 605–610

4:00 pm–5:30 pm

Friday, August 15

4:00 pm–5:30 pm

Track 1

Authentication

Session Chair: Matthias Fassl, CISPA Helmholtz Center for Information Security

Ballroom 6C
Track 2

System Security 5: Securing Systems and Protocols

Session Chair: Shuang Hao, The University of Texas at Dallas

Ballroom 6B
Track 3

Vulnerabilities in LLMs: Privacy, Safety, and Defense

Session Chair: Mainack Mondal, Indian Institute of Technology Kharagpur

Ballroom 6A

Effective PII Extraction from LLMs through Augmented Few-Shot Learning

Shuai Cheng, Shu Meng, Haitao Xu, and Haoran Zhang, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Shuai Hao, Old Dominion University; Chuan Yue, Colorado School of Mines; Wenrui Ma, Zhejiang Gongshang University; Meng Han and Fan Zhang, Zhejiang University; Zhao Li, Zhejiang University and Hangzhou Yugu Technology

Available Media

JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation

Shenyi Zhang and Yuchen Zhai, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University; Keyan Guo and Hongxin Hu, University at Buffalo; Shengnan Guo, Zheng Fang, and Lingchen Zhao, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University; Chao Shen, Xi'an Jiaotong University; Cong Wang, City University of Hong Kong; Qian Wang, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University

Available Media
Track 4

Web Security

Session Chair: Martin Johns, Technische Universität Braunschweig

Room 611–614

ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency

Xinyi Wang and Yeting Li, {CAS-KLONAT, BKLONSPT}, Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences; Jie Lu, SKLP, Institute of Computing Technology, Chinese Academy of Sciences; Shizhe Cui, School of Informatics, The University of Edinburgh; Chenghang Shi, SKLP, Institute of Computing Technology, Chinese Academy of Sciences and School of Computer Science and Technology, University of Chinese Academy of Sciences; Qin Mai, {CAS-KLONAT, BKLONSPT}, Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences; Yunpei Zhang, School of Information and Software Engineering, UESTC; Yang Xiao, Feng Li, and Wei Huo, {CAS-KLONAT, BKLONSPT}, Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences

Available Media
Track 5

Crypto 5: HE, MPC, Oblivious Computation

Session Chair: Andreas Peter, University of Oldenburg

Room 606–609

Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption

Song Bian, Haowen Pan, Jiaqi Hu, Zhou Zhang, and Yunhao Fu, Beihang University; Jiafeng Hua, Huawei Technology; Yi Chen and Bo Zhang, Beijing Academy of Blockchain and Edge Computing; Yier Jin, University of Science and Technology of China; Jin Dong, Beijing Academy of Blockchain and Edge Computing; Zhenyu Guan, Beihang University

Available Media